How IT Can Prepare for Mobile Forensic Investigations

This is especially true of organizations subject to compliance with regulations like PCI-DSS or HIPAA, but any organization could find itself in trouble if it can't get its hands on emails and SMS messages during an ediscovery process.

"If a company faces litigation or some other incident, do they have the capabilities to get the answers that these devices potentially hold inside them, whether through insourcing or outsourcing? That preparation is often an afterthought," says David Nardoni, director of mobile device investigations with Pricewaterhousecooper. "It has to be part of the implementation of your mobile policy."

"Mobile devices really are a whole different world for investigations," he adds. "You could have guys that just spend all their time keeping up with the nuances of mobile devices, just like you have specialists in PCs that focus on network intrusions, etc."

Your Policy Needs to Give You the Right to Examine Employee Devices

Nardoni notes first and foremost that organizations should include a stipulation in their mobile policy that gives the security organization the right to examine an employee's mobile device whether the device is corporate-owned or brought from home.

"Companies need to ensure they have the right authority to be able to examine any device that is brought into their environment," he says. "People are using these devices in a different way than they use their PC. They consider these devices much more personal. Even if it's a corporate-owned device, they still communicate in much more intimate ways than they would if they were on a computer."

Embrace BYOD But Still Limit Authorized Devices

Mobile forensics provide many challenges beyond privacy considerations. The sheer number of devices and mobile operating systems present another key difficulty. There are now more than 800 Android devices alone, running many versions of the operating system. Forensic tools that work on one device or operating system may not work on another. Worse, the tools may be incompatible with new versions of devices or operating systems.

"When it comes to mobile devices, we are constantly trying to get a hold of devices as soon as possible to take a look at what's changed," Nardoni says. "We tell our customers: Before adopting the latest and greatest, make sure that your process and approach is going to be able to adhere to any device you want to use."

Speaking in a broader context about BYOD, Brian Katz, head of mobility engineering at pharmaceutical firm Sanofi, says it is important that organizations pick and choose which devices it will support in its corporate environment, even if it allows BYOD.

"You don't need a BYOD strategy," Katz says while speaking at CITE Forum in New York last week. "Anybody who says you do is trying to sell you something. BYOD is who owns the device. What you care about is what they do with the device regardless of who owns it. I'm a big proponent of managed BYOD. You don't say 'bring whatever you want.' Based upon the controls built into the device, you get certain levels of access. We don't look at LG because LG doesn't have security controls that we can manage."

Speaking at the same event, Steve Damadeo, IT operations manager at industrial control and automation firm Festo, agrees.

"You need to be selective about what you do allow," he says. "We block all Android devices for now because of some of the security concerns that have come up and ease of management."

Train Your IT Teams in the Tools

New security features are often the biggest problem for mobile forensic investigators, Nardoni says. A new version of a device or operating system may fully encrypt the disk, prevent investigators from bypassing a passcode or even stop them from imaging the device completely. Vendors of mobile forensics tools continue to make progress on all these fronts, Nardoni says, but they are still far from the sophistication and granularity offered by PC forensics tools.

Most tools these days can handle logical acquisition of data (resident email, contacts, etc.) from the device, but physical extraction of things like deleted SMS messages, actual files and folders, etc. is often trickier. Even tools that are capable of physical extraction tend to be specialized for a particular task.

"It's not a one tool fits all solution," Nardoni says. "It's really important to focus on which tool is going to give you the most complete picture of what you're trying to investigate. Maybe this one will pull the email, this one will pull the contacts and SMS and this one will pull the Internet history."

To deal with this plethora of tools and technologies, Nardoni says you must ensure that your security teams are trained in their use before they need to deploy them.

"The CISOs and CIOs and directors of security should be focused on talking with their teams and getting them trained on the various tools out there and what evidence can be retrieved from these devices," he says. "Try to standardize on a certain set of devices. Make sure your teams have adequate tools and training to investigate these devices. Even more importantly, make sure you have the proper policies in place from legal to allow them to investigate these devices."

Copyright 2018 IDG Communications. ABN 14 001 592 650. All rights reserved. Reproduction in whole or in part in any form or medium without express written permission of IDG Communications is prohibited.